ID

VAR-202101-1926


CVE

CVE-2021-3156


TITLE

sudo  Heap-based buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-001020

DESCRIPTION

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. sudo has a heap-based buffer overflow due to the implementation of escaping special characters set in command arguments (CWE-122) Vulnerability exists. 2021 Year 2 Moon 5 As of the date macOS , AIX , Solaris It has been reported that it may also be affected by the virus, but it has not been confirmed by the finder. note that, 2021 Year 2 Moon 9 On the day Apple has released a security update to address this issue.A local third party can elevate privileges and execute commands with administrator privileges. Sensormatic Electronics Company ( Johnson Controls subsidiary) Illustra is a surveillance and security camera system. Illustra includes vulnerabilities related to boundary condition determination ( CWE-193 , CVE-2021-3156 ) exists.Installed in the product by a third party under certain conditions Linux Operating system administrator privileges can be obtained. 6 ELS) - i386, s390x, x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-02-09-1 macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, and macOS Mojave 10.14.6 Security Update 2021-002 macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update, and macOS Mojave 10.14.6 Security Update 2021-002 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212177. macOS Big Sur 11.2.1, macOS Catalina 10.15.7 Supplemental Update*, macOS Mojave 10.14.6 Security Update 2021-002 Intel Graphics Driver Available for: macOS Big Sur 11.2, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write was addressed with improved input validation. CVE-2021-1805: ABC Research s.r.o. working with Trend Micro Zero Day Initiative Intel Graphics Driver Available for: macOS Big Sur 11.2, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed with additional validation. CVE-2021-1806: ABC Research s.r.o. working with Trend Micro Zero Day Initiative Sudo Available for: macOS Big Sur 11.2, macOS Catalina 10.15.7, macOS Mojave 10.14.6 Impact: A local attacker may be able to elevate their privileges Description: This issue was addressed by updating to sudo version 1.9.5p2. CVE-2021-3156: Qualys * After installing this update, the build number for macOS Catalina 10.15.7 is 19H524. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. ========================================================================== Ubuntu Security Notice USN-4705-1 January 26, 2021 sudo vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Sudo. A local attacker could possibly use this issue to obtain unintended access to the administrator account. (CVE-2021-3156) It was discovered that the Sudo sudoedit utility incorrectly handled checking directory permissions. A local attacker could possibly use this issue to bypass file permissions and determine if a directory exists or not. (CVE-2021-23239) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: sudo 1.9.1-1ubuntu1.1 sudo-ldap 1.9.1-1ubuntu1.1 Ubuntu 20.04 LTS: sudo 1.8.31-1ubuntu1.2 sudo-ldap 1.8.31-1ubuntu1.2 Ubuntu 18.04 LTS: sudo 1.8.21p2-3ubuntu1.4 sudo-ldap 1.8.21p2-3ubuntu1.4 Ubuntu 16.04 LTS: sudo 1.8.16-0ubuntu1.10 sudo-ldap 1.8.16-0ubuntu1.10 In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: sudo security update Advisory ID: RHSA-2021:0224-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:0224 Issue date: 2021-01-26 CVE Names: CVE-2021-3156 ==================================================================== 1. Summary: An update for sudo is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.4) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64 3. Description: The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix(es): * sudo: Heap buffer overflow in argument parsing (CVE-2021-3156) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1917684 - CVE-2021-3156 sudo: Heap buffer overflow in argument parsing 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: sudo-1.8.19p2-12.el7_4.2.src.rpm x86_64: sudo-1.8.19p2-12.el7_4.2.x86_64.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: sudo-1.8.19p2-12.el7_4.2.src.rpm ppc64le: sudo-1.8.19p2-12.el7_4.2.ppc64le.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.ppc64le.rpm x86_64: sudo-1.8.19p2-12.el7_4.2.x86_64.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: sudo-1.8.19p2-12.el7_4.2.src.rpm x86_64: sudo-1.8.19p2-12.el7_4.2.x86_64.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.4): x86_64: sudo-debuginfo-1.8.19p2-12.el7_4.2.i686.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.x86_64.rpm sudo-devel-1.8.19p2-12.el7_4.2.i686.rpm sudo-devel-1.8.19p2-12.el7_4.2.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.4): ppc64le: sudo-debuginfo-1.8.19p2-12.el7_4.2.ppc64le.rpm sudo-devel-1.8.19p2-12.el7_4.2.ppc64le.rpm x86_64: sudo-debuginfo-1.8.19p2-12.el7_4.2.i686.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.x86_64.rpm sudo-devel-1.8.19p2-12.el7_4.2.i686.rpm sudo-devel-1.8.19p2-12.el7_4.2.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.4): x86_64: sudo-debuginfo-1.8.19p2-12.el7_4.2.i686.rpm sudo-debuginfo-1.8.19p2-12.el7_4.2.x86_64.rpm sudo-devel-1.8.19p2-12.el7_4.2.i686.rpm sudo-devel-1.8.19p2-12.el7_4.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3156 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-002 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYBB1htzjgjWX9erEAQjwNQ/9HBoqYFsK25G0+2QKqO2FTwr0G7P5gx3n 93VL0desDcpNXLdd4lwWcx1gAQkKSiYtMyFl5JdrqTznudDPo/V4dPBbPl3hkIr8 zGiiKTDErT2MeCm5T4RXJVFzCCJA78io7MENH0Wr0SVTybjljKs1m06egY120kC0 ax3v92dap0K6KNAlVLscRzc2p0veauF+cfpk+5+Zomzw89QRTrWYt7BBxUxFsk2u sS0t9cmT3UURXjsqdDjMmilxWbqmKzKePhWeCfu8zBNc+TacLSXBqZmPgSlB1V5U WTzSNIu3AGSpcniqcx0It4ncfmwGfmmekQ0U4ZTBLkM+fr7krikFiBFsf+jPaqvn PNFdJY318EAJWxzRGhf9UunlMVYrimjjNxqMU1LVIxIhRzQEi0BhlMIcFjIZp0UN Pa1nqJ0YKZbZ/+vvqzd6c6lALjsYBSOhkEpmr0ZivaXl1wIPB4cZ4yrKjMlO0DsP qsG4YmwIq+pl85wH4dPA2TG7mMF4CdWYvykUQlVfYSlGAXAllGaeNDAnySfi/FWE zXTdkjxc9uHojrhfUtX5pDoflFWoerbbaLK//fCTFuULhKfAhe5QidiCiU+LpFb2 aM23SHk+HZm8LnC2KM0fe0VzSk9fHWgOYXHx0iOYsqwRzHwe+d+AJ4bZkKxf2/pT /eC3svyPRxA=fsAW -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7) - aarch64, ppc64le, s390x 3. 8) - aarch64, ppc64le, s390x, x86_64 3

Trust: 3.15

sources: NVD: CVE-2021-3156 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // VULHUB: VHN-383931 // PACKETSTORM: 161139 // PACKETSTORM: 161141 // PACKETSTORM: 161398 // PACKETSTORM: 161163 // PACKETSTORM: 161135 // PACKETSTORM: 161142 // PACKETSTORM: 161145 // PACKETSTORM: 161138

AFFECTED PRODUCTS

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:sudomodel:sudoscope:gteversion:1.9.0

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:lteversion:10.3.0.2.1

Trust: 1.0

vendor:netappmodel:ontap select deploy administration utilityscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:micros es400scope:gteversion:400

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:lteversion:10.4.0.3.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:10.0.4

Trust: 1.0

vendor:beyondtrustmodel:privilege management for macscope:ltversion:21.1.1

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:9.2.8

Trust: 1.0

vendor:oraclemodel:micros es400scope:lteversion:410

Trust: 1.0

vendor:synologymodel:skynasscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:gteversion:10.3.0.0.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:synologymodel:diskstation managerscope:eqversion:6.2

Trust: 1.0

vendor:sudomodel:sudoscope:ltversion:1.8.32

Trust: 1.0

vendor:oraclemodel:micros kitchen display systemscope:eqversion:210

Trust: 1.0

vendor:beyondtrustmodel:privilege management for unix\/linuxscope:ltversion:10.3.2-10

Trust: 1.0

vendor:sudomodel:sudoscope:ltversion:1.9.5

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:gteversion:7.4.0

Trust: 1.0

vendor:synologymodel:diskstation manager unified controllerscope:eqversion:3.0

Trust: 1.0

vendor:oraclemodel:micros compact workstation 3scope:eqversion:310

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:web gatewayscope:eqversion:8.2.17

Trust: 1.0

vendor:oraclemodel:micros workstation 6scope:gteversion:610

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:sudomodel:sudoscope:gteversion:1.8.2

Trust: 1.0

vendor:netappmodel:oncommand unified manager core packagescope:eqversion: -

Trust: 1.0

vendor:synologymodel:vs960hdscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:lteversion:7.7.1

Trust: 1.0

vendor:sudomodel:sudoscope:eqversion:1.9.5

Trust: 1.0

vendor:netappmodel:ontap toolsscope:eqversion:9

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:micros workstation 6scope:lteversion:655

Trust: 1.0

vendor:oraclemodel:communications performance intelligence centerscope:gteversion:10.4.0.1.0

Trust: 1.0

vendor:oraclemodel:micros workstation 5ascope:eqversion:5a

Trust: 1.0

vendor:sudomodel:sudoscope: - version: -

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion:1.9.0 to 1.9.5p1

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion: -

Trust: 0.8

vendor:sudomodel:sudoscope:eqversion:1.8.2 to 1.8.31p2

Trust: 0.8

vendor:sensormaticmodel:insightscope: - version: -

Trust: 0.8

vendor:sensormaticmodel:flex gen 2scope: - version: -

Trust: 0.8

vendor:sensormaticmodel:pro 2scope: - version: -

Trust: 0.8

vendor:sensormaticmodel:pro gen 3scope:eqversion:v2.8.0 all previous s

Trust: 0.8

sources: JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-3156
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2021-3156
value: HIGH

Trust: 1.0

NVD: CVE-2021-3156
value: HIGH

Trust: 0.8

OTHER: JVNDB-2021-002344
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202101-2221
value: HIGH

Trust: 0.6

VULHUB: VHN-383931
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-3156
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-383931
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-3156
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2021-3156
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

OTHER: JVNDB-2021-002344
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-383931 // CNNVD: CNNVD-202101-2221 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156 // NVD: CVE-2021-3156

PROBLEMTYPE DATA

problemtype:CWE-193

Trust: 1.1

problemtype:Heap-based buffer overflow (CWE-122) [IPA evaluation ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

problemtype:Determination of boundary conditions (CWE-193) [ others ]

Trust: 0.8

sources: VULHUB: VHN-383931 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

THREAT TYPE

local

Trust: 0.8

sources: PACKETSTORM: 161163 // PACKETSTORM: 161135 // CNNVD: CNNVD-202101-2221

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202101-2221

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-383931

PATCH

title:Buffer overflow in command line unescaping Apple Apple Security Updatesurl:https://www.sudo.ws/alerts/unescape_overflow.html

Trust: 0.8

title:Product Security Advisory | JCI-PSA-2021-13 (( PDF )url:https://www.johnsoncontrols.com/-/media/jci/cyber-solutions/product-security-advisories/2021/jci-psa-2021-13.pdf?la=en&hash=FC6A4C7293ABA5697AC763F92E4256CA4F3D7B1D

Trust: 0.8

sources: JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344

EXTERNAL IDS

db:NVDid:CVE-2021-3156

Trust: 5.7

db:CERT/CCid:VU#794544

Trust: 2.5

db:ICS CERTid:ICSA-22-256-01

Trust: 2.2

db:PACKETSTORMid:161230

Trust: 1.7

db:PACKETSTORMid:161160

Trust: 1.7

db:PACKETSTORMid:161270

Trust: 1.7

db:PACKETSTORMid:161293

Trust: 1.7

db:MCAFEEid:SB10348

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/01/27/2

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/01/26/3

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/02/15/1

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/01/27/1

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/09/14/2

Trust: 1.7

db:JVNid:JVNVU96493147

Trust: 1.6

db:JVNid:JVNVU90511416

Trust: 1.6

db:ICS CERTid:ICSA-21-245-01

Trust: 1.4

db:OPENWALLid:OSS-SECURITY/2024/01/30/6

Trust: 1.0

db:OPENWALLid:OSS-SECURITY/2024/01/30/8

Trust: 1.0

db:PACKETSTORMid:176932

Trust: 1.0

db:PACKETSTORMid:161163

Trust: 0.8

db:PACKETSTORMid:161135

Trust: 0.8

db:JVNid:JVNVU99480250

Trust: 0.8

db:JVNid:JVNVU98963695

Trust: 0.8

db:JVNid:JVNVU92304019

Trust: 0.8

db:JVNid:JVNVU91343607

Trust: 0.8

db:JVNDBid:JVNDB-2021-001020

Trust: 0.8

db:JVNid:JVNVU96372273

Trust: 0.8

db:JVNDBid:JVNDB-2021-002344

Trust: 0.8

db:PACKETSTORMid:161281

Trust: 0.7

db:PACKETSTORMid:162961

Trust: 0.6

db:AUSCERTid:ESB-2021.1815

Trust: 0.6

db:AUSCERTid:ESB-2021.1216

Trust: 0.6

db:AUSCERTid:ESB-2022.4571

Trust: 0.6

db:AUSCERTid:ESB-2021.2604

Trust: 0.6

db:AUSCERTid:ESB-2021.1330

Trust: 0.6

db:AUSCERTid:ESB-2021.0609

Trust: 0.6

db:AUSCERTid:ESB-2021.1012

Trust: 0.6

db:AUSCERTid:ESB-2021.0293

Trust: 0.6

db:AUSCERTid:ESB-2021.0281

Trust: 0.6

db:AUSCERTid:ESB-2021.0329

Trust: 0.6

db:AUSCERTid:ESB-2021.2984

Trust: 0.6

db:AUSCERTid:ESB-2021.1651

Trust: 0.6

db:AUSCERTid:ESB-2021.0864

Trust: 0.6

db:AUSCERTid:ESB-2021.0467

Trust: 0.6

db:AUSCERTid:ESB-2021.0329.2

Trust: 0.6

db:AUSCERTid:ESB-2021.4036

Trust: 0.6

db:AUSCERTid:ESB-2021.1207

Trust: 0.6

db:ICS CERTid:ICSA-21-147-02

Trust: 0.6

db:ICS CERTid:ICSA-21-334-04

Trust: 0.6

db:ICS CERTid:ICSA-21-119-03

Trust: 0.6

db:ICS CERTid:ICSA-21-133-02

Trust: 0.6

db:CS-HELPid:SB2021051402

Trust: 0.6

db:CS-HELPid:SB2021052804

Trust: 0.6

db:CS-HELPid:SB2021092209

Trust: 0.6

db:CS-HELPid:SB2021072732

Trust: 0.6

db:CS-HELPid:SB2021120103

Trust: 0.6

db:CS-HELPid:SB2021090304

Trust: 0.6

db:CS-HELPid:SB2021122914

Trust: 0.6

db:EXPLOIT-DBid:49522

Trust: 0.6

db:CNNVDid:CNNVD-202101-2221

Trust: 0.6

db:PACKETSTORMid:161141

Trust: 0.2

db:PACKETSTORMid:161138

Trust: 0.2

db:PACKETSTORMid:161142

Trust: 0.2

db:PACKETSTORMid:161139

Trust: 0.2

db:PACKETSTORMid:161398

Trust: 0.2

db:PACKETSTORMid:161145

Trust: 0.2

db:PACKETSTORMid:161143

Trust: 0.1

db:PACKETSTORMid:161152

Trust: 0.1

db:PACKETSTORMid:161144

Trust: 0.1

db:PACKETSTORMid:161140

Trust: 0.1

db:PACKETSTORMid:161272

Trust: 0.1

db:PACKETSTORMid:161136

Trust: 0.1

db:PACKETSTORMid:161137

Trust: 0.1

db:SEEBUGid:SSVID-99117

Trust: 0.1

db:VULHUBid:VHN-383931

Trust: 0.1

sources: VULHUB: VHN-383931 // PACKETSTORM: 161139 // PACKETSTORM: 161141 // PACKETSTORM: 161398 // PACKETSTORM: 161163 // PACKETSTORM: 161135 // PACKETSTORM: 161142 // PACKETSTORM: 161145 // PACKETSTORM: 161138 // CNNVD: CNNVD-202101-2221 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

REFERENCES

url:http://www.openwall.com/lists/oss-security/2021/01/26/3

Trust: 3.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3156

Trust: 3.0

url:https://www.kb.cert.org/vuls/id/794544

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sudo-privesc-jan2021-qnyqfcm

Trust: 2.3

url:http://packetstormsecurity.com/files/161160/sudo-heap-based-buffer-overflow.html

Trust: 2.3

url:http://packetstormsecurity.com/files/161230/sudo-buffer-overflow-privilege-escalation.html

Trust: 2.3

url:http://packetstormsecurity.com/files/161293/sudo-1.8.31p2-1.9.5p1-buffer-overflow.html

Trust: 2.3

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 2.3

url:https://security.netapp.com/advisory/ntap-20210128-0001/

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20210128-0002/

Trust: 1.7

url:https://support.apple.com/kb/ht212177

Trust: 1.7

url:https://www.sudo.ws/stable.html#1.9.5p2

Trust: 1.7

url:https://www.synology.com/security/advisory/synology_sa_21_02

Trust: 1.7

url:https://www.debian.org/security/2021/dsa-4839

Trust: 1.7

url:http://seclists.org/fulldisclosure/2021/jan/79

Trust: 1.7

url:http://seclists.org/fulldisclosure/2021/feb/42

Trust: 1.7

url:https://security.gentoo.org/glsa/202101-33

Trust: 1.7

url:http://packetstormsecurity.com/files/161270/sudo-1.9.5p1-buffer-overflow-privilege-escalation.html

Trust: 1.7

url:https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability

Trust: 1.7

url:https://www.oracle.com//security-alerts/cpujul2021.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/01/27/1

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/01/27/2

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/02/15/1

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2021/09/14/2

Trust: 1.7

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10348

Trust: 1.6

url:http://jvn.jp/vu/jvnvu90511416/index.html

Trust: 1.6

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-256-01

Trust: 1.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-245-01

Trust: 1.4

url:https://access.redhat.com/security/cve/cve-2021-3156

Trust: 1.1

url:http://seclists.org/fulldisclosure/2024/feb/3

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/cala5ftxiqbrryua2zqnjxb6oqmaxeii/

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2024/01/30/6

Trust: 1.0

url:https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156

Trust: 1.0

url:http://packetstormsecurity.com/files/176932/glibc-syslog-heap-based-buffer-overflow.html

Trust: 1.0

url:http://www.openwall.com/lists/oss-security/2024/01/30/8

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/lhxk6ico5aylgfk2tax5mzkuxtukwojy/

Trust: 1.0

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2021-3156

Trust: 1.0

url:http://jvn.jp/cert/jvnvu96493147

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92304019/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98963695/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu91343607/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99480250/

Trust: 0.8

url:https://www.jpcert.or.jp/at/2021/at210005.html

Trust: 0.8

url:https://kb.cert.org/vuls/id/794544

Trust: 0.8

url:https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit

Trust: 0.8

url:http://jvn.jp/cert/jvnvu96372273

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96493147/

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/lhxk6ico5aylgfk2tax5mzkuxtukwojy/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/cala5ftxiqbrryua2zqnjxb6oqmaxeii/

Trust: 0.7

url:https://www.ibm.com/support/pages/node/6455281

Trust: 0.6

url:https://vigilance.fr/vulnerability/sudo-buffer-overflow-via-command-unescaping-backslashes-34414

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051402

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-133-02

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0329/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1207

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1330

Trust: 0.6

url:https://packetstormsecurity.com/files/162961/heap-based-overflow-vulnerability-in-sudo.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2984

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1012

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1651

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4571

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021052804

Trust: 0.6

url:https://www.oracle.com/security-alerts/cpujul2021.html

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-affected-by-multiple-vulnerabilities-4/

Trust: 0.6

url:https://www.exploit-db.com/exploits/49522

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0329.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0609

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-119-03

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1216

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072732

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1815

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0293/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-147-02

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021120103

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0281/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-334-04

Trust: 0.6

url:https://packetstormsecurity.com/files/161281/red-hat-security-advisory-2021-0401-01.html

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20210310-01-escalation-cn

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-sudo-as-used-by-ibm-qradar-siem-is-vulnerable-to-arbitrary-code-execution/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090304

Trust: 0.6

url:https://support.apple.com/en-us/ht212177

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210210-01-sudo-cn

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-vulnerabilities-in-the-linux-kernel-samba-sudo-python-and-tcmu-runner-affect-ibm-spectrum-protect-plus/

Trust: 0.6

url:https://packetstormsecurity.com/files/161163/ubuntu-security-notice-usn-4705-2.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092209

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-affected-by-multiple-vulnerabilities-6/

Trust: 0.6

url:https://packetstormsecurity.com/files/161135/ubuntu-security-notice-usn-4705-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122914

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0864

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0467

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2604

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-256-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4036

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-security-guardium-is-affected-by-multiple-vulnerabilities-5/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-002

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://usn.ubuntu.com/4705-1

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10348

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0225

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0227

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://support.apple.com/ht212177.

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-1806

Trust: 0.1

url:https://usn.ubuntu.com/4705-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.8.31-1ubuntu1.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23239

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.9.1-1ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.8.16-0ubuntu1.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/sudo/1.8.21p2-3ubuntu1.4

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0224

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0223

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0218

Trust: 0.1

sources: VULHUB: VHN-383931 // PACKETSTORM: 161139 // PACKETSTORM: 161141 // PACKETSTORM: 161398 // PACKETSTORM: 161163 // PACKETSTORM: 161135 // PACKETSTORM: 161142 // PACKETSTORM: 161145 // PACKETSTORM: 161138 // CNNVD: CNNVD-202101-2221 // JVNDB: JVNDB-2021-001020 // JVNDB: JVNDB-2021-002344 // NVD: CVE-2021-3156

CREDITS

Ubuntu

Trust: 0.8

sources: PACKETSTORM: 161163 // PACKETSTORM: 161135 // CNNVD: CNNVD-202101-2221

SOURCES

db:VULHUBid:VHN-383931
db:PACKETSTORMid:161139
db:PACKETSTORMid:161141
db:PACKETSTORMid:161398
db:PACKETSTORMid:161163
db:PACKETSTORMid:161135
db:PACKETSTORMid:161142
db:PACKETSTORMid:161145
db:PACKETSTORMid:161138
db:CNNVDid:CNNVD-202101-2221
db:JVNDBid:JVNDB-2021-001020
db:JVNDBid:JVNDB-2021-002344
db:NVDid:CVE-2021-3156

LAST UPDATE DATE

2026-02-05T16:00:03.338000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-383931date:2022-09-03T00:00:00
db:CNNVDid:CNNVD-202101-2221date:2022-09-15T00:00:00
db:JVNDBid:JVNDB-2021-001020date:2022-09-15T05:47:00
db:JVNDBid:JVNDB-2021-002344date:2022-09-15T05:47:00
db:NVDid:CVE-2021-3156date:2025-11-10T14:41:45.053

SOURCES RELEASE DATE

db:VULHUBid:VHN-383931date:2021-01-26T00:00:00
db:PACKETSTORMid:161139date:2021-01-27T14:06:12
db:PACKETSTORMid:161141date:2021-01-27T14:06:28
db:PACKETSTORMid:161398date:2021-02-12T17:29:14
db:PACKETSTORMid:161163date:2021-01-28T13:59:34
db:PACKETSTORMid:161135date:2021-01-27T14:05:32
db:PACKETSTORMid:161142date:2021-01-27T14:06:37
db:PACKETSTORMid:161145date:2021-01-27T14:07:05
db:PACKETSTORMid:161138date:2021-01-27T14:06:02
db:CNNVDid:CNNVD-202101-2221date:2021-01-26T00:00:00
db:JVNDBid:JVNDB-2021-001020date:2021-02-08T00:00:00
db:JVNDBid:JVNDB-2021-002344date:2021-09-06T00:00:00
db:NVDid:CVE-2021-3156date:2021-01-26T21:15:12.987